Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 09:49
Behavioral task
behavioral1
Sample
e0fd9d1717eee57b6a8fe15e65295890_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
e0fd9d1717eee57b6a8fe15e65295890_NeikiAnalytics.exe
-
Size
92KB
-
MD5
e0fd9d1717eee57b6a8fe15e65295890
-
SHA1
5f0b4b8f39b09455442458fe88f6b535a9bceeca
-
SHA256
0c601644031141fffadd9e1d2a9c6d3914b69f38612cbad60a6b2281cb3ddaca
-
SHA512
f9cc77438d91afa1802f411025ea86a1af957deb80f25af56d13c5f23528e94dd89d56ce3cccfcfe011e7c4dca74c3587263a02529df65569501778630e9b5fc
-
SSDEEP
1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWpT0:8hOmTsF93UYfwC6GIout0fmCiiiXA6m2
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3628-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/916-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4356-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3092-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3388-21-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1132-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3440-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2000-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4248-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1948-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2008-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3708-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/908-78-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2380-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2868-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4568-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/232-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4528-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/664-126-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/928-137-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2960-143-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4388-147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3948-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1432-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2044-159-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4608-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3572-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4672-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4900-178-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2968-182-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2092-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2912-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4316-193-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/984-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1236-212-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3960-219-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2752-226-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/432-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2560-243-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1128-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/64-255-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2572-262-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/32-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2984-272-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4156-277-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2844-288-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1452-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2892-296-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3600-299-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4968-314-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2740-319-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1236-335-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3108-351-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3108-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/208-373-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1004-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1512-397-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4024-421-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2300-480-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3500-529-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4280-532-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2828-598-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1452-624-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4780-782-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
lfffxff.exenbnhhh.exe3pppd.exebbhbhh.exentttnt.exerrrrlrl.exerrrlxrx.exenhtnhb.exe7vvvd.exefxxxxxf.exe1rflflf.exenhbbhh.exejjjjj.exeffxxlff.exennbbbn.exe9pppd.exelllxxfx.exetnthth.exeppdvp.exerfllfrr.exebtbtnn.exejdjdd.exexfxllrl.exenbnbbb.exevjdjd.exelrxxfrx.exebhnnth.exejppvj.exetbbttb.exejvvjj.exerxfxrrl.exetbttnn.exejdjdp.exerxllfrr.exebbbbnn.exedvpjj.exe9xrlfff.exe5bbtbb.exebnbhnt.exevjjjv.exe3rffxff.exerrffxxr.exetnnbth.exejpddj.exejpppj.exeffllrrx.exenhbnhn.exejppvj.exelfrrfff.exebnnntt.exetnttnb.exedvvvj.exeddddd.exerrfrrrr.exebbbtth.exe9vvvj.exexrxrrrl.exexrlffff.exebbtnhn.exedvjvj.exejpvjv.exexlffrxr.exehnnnnt.exe1vvvv.exepid process 4356 lfffxff.exe 916 nbnhhh.exe 3388 3pppd.exe 3092 bbhbhh.exe 1132 ntttnt.exe 3440 rrrrlrl.exe 2000 rrrlxrx.exe 548 nhtnhb.exe 4248 7vvvd.exe 1948 fxxxxxf.exe 3108 1rflflf.exe 4920 nhbbhh.exe 2008 jjjjj.exe 3708 ffxxlff.exe 908 nnbbbn.exe 2380 9pppd.exe 1212 lllxxfx.exe 2868 tnthth.exe 4652 ppdvp.exe 4568 rfllfrr.exe 232 btbtnn.exe 3496 jdjdd.exe 1920 xfxllrl.exe 4528 nbnbbb.exe 216 vjdjd.exe 664 lrxxfrx.exe 1856 bhnnth.exe 928 jppvj.exe 2960 tbbttb.exe 4388 jvvjj.exe 3948 rxfxrrl.exe 1432 tbttnn.exe 2044 jdjdp.exe 3476 rxllfrr.exe 4244 bbbbnn.exe 3256 dvpjj.exe 4608 9xrlfff.exe 4548 5bbtbb.exe 3572 bnbhnt.exe 4672 vjjjv.exe 4900 3rffxff.exe 2968 rrffxxr.exe 2564 tnnbth.exe 2092 jpddj.exe 2912 jpppj.exe 4316 ffllrrx.exe 1876 nhbnhn.exe 984 jppvj.exe 916 lfrrfff.exe 2052 bnnntt.exe 4336 tnttnb.exe 4712 dvvvj.exe 3516 ddddd.exe 1236 rrfrrrr.exe 3520 bbbtth.exe 2940 9vvvj.exe 3960 xrxrrrl.exe 2000 xrlffff.exe 548 bbtnhn.exe 2752 dvjvj.exe 2800 jpvjv.exe 4176 xlffrxr.exe 432 hnnnnt.exe 2364 1vvvv.exe -
Processes:
resource yara_rule behavioral2/memory/3628-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lfffxff.exe upx behavioral2/memory/3628-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4356-6-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbnhhh.exe upx behavioral2/memory/916-12-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3pppd.exe upx behavioral2/memory/4356-16-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bbhbhh.exe upx behavioral2/memory/3092-23-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3388-21-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ntttnt.exe upx C:\rrrrlrl.exe upx behavioral2/memory/1132-31-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rrrlxrx.exe upx behavioral2/memory/3440-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2000-41-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nhtnhb.exe upx behavioral2/memory/4248-46-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\7vvvd.exe upx \??\c:\fxxxxxf.exe upx behavioral2/memory/4248-51-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1rflflf.exe upx behavioral2/memory/1948-56-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhbbhh.exe upx C:\jjjjj.exe upx C:\ffxxlff.exe upx behavioral2/memory/2008-68-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nnbbbn.exe upx behavioral2/memory/3708-73-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9pppd.exe upx behavioral2/memory/908-78-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lllxxfx.exe upx behavioral2/memory/2380-83-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnthth.exe upx \??\c:\ppdvp.exe upx behavioral2/memory/2868-93-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rfllfrr.exe upx behavioral2/memory/4568-101-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\btbtnn.exe upx behavioral2/memory/232-104-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdjdd.exe upx C:\xfxllrl.exe upx C:\nbnbbb.exe upx behavioral2/memory/4528-119-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\vjdjd.exe upx \??\c:\lrxxfrx.exe upx behavioral2/memory/664-126-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bhnnth.exe upx C:\jppvj.exe upx C:\tbbttb.exe upx behavioral2/memory/928-137-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jvvjj.exe upx behavioral2/memory/2960-143-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rxfxrrl.exe upx behavioral2/memory/4388-147-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tbttnn.exe upx behavioral2/memory/3948-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1432-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2044-159-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4608-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3572-173-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4672-176-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4900-178-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e0fd9d1717eee57b6a8fe15e65295890_NeikiAnalytics.exelfffxff.exenbnhhh.exe3pppd.exebbhbhh.exentttnt.exerrrrlrl.exerrrlxrx.exenhtnhb.exe7vvvd.exefxxxxxf.exe1rflflf.exenhbbhh.exejjjjj.exeffxxlff.exennbbbn.exe9pppd.exelllxxfx.exetnthth.exeppdvp.exerfllfrr.exebtbtnn.exedescription pid process target process PID 3628 wrote to memory of 4356 3628 e0fd9d1717eee57b6a8fe15e65295890_NeikiAnalytics.exe lfffxff.exe PID 3628 wrote to memory of 4356 3628 e0fd9d1717eee57b6a8fe15e65295890_NeikiAnalytics.exe lfffxff.exe PID 3628 wrote to memory of 4356 3628 e0fd9d1717eee57b6a8fe15e65295890_NeikiAnalytics.exe lfffxff.exe PID 4356 wrote to memory of 916 4356 lfffxff.exe nbnhhh.exe PID 4356 wrote to memory of 916 4356 lfffxff.exe nbnhhh.exe PID 4356 wrote to memory of 916 4356 lfffxff.exe nbnhhh.exe PID 916 wrote to memory of 3388 916 nbnhhh.exe 3pppd.exe PID 916 wrote to memory of 3388 916 nbnhhh.exe 3pppd.exe PID 916 wrote to memory of 3388 916 nbnhhh.exe 3pppd.exe PID 3388 wrote to memory of 3092 3388 3pppd.exe bbhbhh.exe PID 3388 wrote to memory of 3092 3388 3pppd.exe bbhbhh.exe PID 3388 wrote to memory of 3092 3388 3pppd.exe bbhbhh.exe PID 3092 wrote to memory of 1132 3092 bbhbhh.exe ntttnt.exe PID 3092 wrote to memory of 1132 3092 bbhbhh.exe ntttnt.exe PID 3092 wrote to memory of 1132 3092 bbhbhh.exe ntttnt.exe PID 1132 wrote to memory of 3440 1132 ntttnt.exe rrrrlrl.exe PID 1132 wrote to memory of 3440 1132 ntttnt.exe rrrrlrl.exe PID 1132 wrote to memory of 3440 1132 ntttnt.exe rrrrlrl.exe PID 3440 wrote to memory of 2000 3440 rrrrlrl.exe rrrlxrx.exe PID 3440 wrote to memory of 2000 3440 rrrrlrl.exe rrrlxrx.exe PID 3440 wrote to memory of 2000 3440 rrrrlrl.exe rrrlxrx.exe PID 2000 wrote to memory of 548 2000 rrrlxrx.exe nhtnhb.exe PID 2000 wrote to memory of 548 2000 rrrlxrx.exe nhtnhb.exe PID 2000 wrote to memory of 548 2000 rrrlxrx.exe nhtnhb.exe PID 548 wrote to memory of 4248 548 nhtnhb.exe 7vvvd.exe PID 548 wrote to memory of 4248 548 nhtnhb.exe 7vvvd.exe PID 548 wrote to memory of 4248 548 nhtnhb.exe 7vvvd.exe PID 4248 wrote to memory of 1948 4248 7vvvd.exe fxxxxxf.exe PID 4248 wrote to memory of 1948 4248 7vvvd.exe fxxxxxf.exe PID 4248 wrote to memory of 1948 4248 7vvvd.exe fxxxxxf.exe PID 1948 wrote to memory of 3108 1948 fxxxxxf.exe 1rflflf.exe PID 1948 wrote to memory of 3108 1948 fxxxxxf.exe 1rflflf.exe PID 1948 wrote to memory of 3108 1948 fxxxxxf.exe 1rflflf.exe PID 3108 wrote to memory of 4920 3108 1rflflf.exe nhbbhh.exe PID 3108 wrote to memory of 4920 3108 1rflflf.exe nhbbhh.exe PID 3108 wrote to memory of 4920 3108 1rflflf.exe nhbbhh.exe PID 4920 wrote to memory of 2008 4920 nhbbhh.exe jjjjj.exe PID 4920 wrote to memory of 2008 4920 nhbbhh.exe jjjjj.exe PID 4920 wrote to memory of 2008 4920 nhbbhh.exe jjjjj.exe PID 2008 wrote to memory of 3708 2008 jjjjj.exe ffxxlff.exe PID 2008 wrote to memory of 3708 2008 jjjjj.exe ffxxlff.exe PID 2008 wrote to memory of 3708 2008 jjjjj.exe ffxxlff.exe PID 3708 wrote to memory of 908 3708 ffxxlff.exe nnbbbn.exe PID 3708 wrote to memory of 908 3708 ffxxlff.exe nnbbbn.exe PID 3708 wrote to memory of 908 3708 ffxxlff.exe nnbbbn.exe PID 908 wrote to memory of 2380 908 nnbbbn.exe 9pppd.exe PID 908 wrote to memory of 2380 908 nnbbbn.exe 9pppd.exe PID 908 wrote to memory of 2380 908 nnbbbn.exe 9pppd.exe PID 2380 wrote to memory of 1212 2380 9pppd.exe lllxxfx.exe PID 2380 wrote to memory of 1212 2380 9pppd.exe lllxxfx.exe PID 2380 wrote to memory of 1212 2380 9pppd.exe lllxxfx.exe PID 1212 wrote to memory of 2868 1212 lllxxfx.exe tnthth.exe PID 1212 wrote to memory of 2868 1212 lllxxfx.exe tnthth.exe PID 1212 wrote to memory of 2868 1212 lllxxfx.exe tnthth.exe PID 2868 wrote to memory of 4652 2868 tnthth.exe ppdvp.exe PID 2868 wrote to memory of 4652 2868 tnthth.exe ppdvp.exe PID 2868 wrote to memory of 4652 2868 tnthth.exe ppdvp.exe PID 4652 wrote to memory of 4568 4652 ppdvp.exe rfllfrr.exe PID 4652 wrote to memory of 4568 4652 ppdvp.exe rfllfrr.exe PID 4652 wrote to memory of 4568 4652 ppdvp.exe rfllfrr.exe PID 4568 wrote to memory of 232 4568 rfllfrr.exe btbtnn.exe PID 4568 wrote to memory of 232 4568 rfllfrr.exe btbtnn.exe PID 4568 wrote to memory of 232 4568 rfllfrr.exe btbtnn.exe PID 232 wrote to memory of 3496 232 btbtnn.exe jdjdd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0fd9d1717eee57b6a8fe15e65295890_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e0fd9d1717eee57b6a8fe15e65295890_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\lfffxff.exec:\lfffxff.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\nbnhhh.exec:\nbnhhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
\??\c:\3pppd.exec:\3pppd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
\??\c:\bbhbhh.exec:\bbhbhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
\??\c:\ntttnt.exec:\ntttnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\rrrrlrl.exec:\rrrrlrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\rrrlxrx.exec:\rrrlxrx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\nhtnhb.exec:\nhtnhb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\7vvvd.exec:\7vvvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
\??\c:\fxxxxxf.exec:\fxxxxxf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\1rflflf.exec:\1rflflf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
\??\c:\nhbbhh.exec:\nhbbhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\jjjjj.exec:\jjjjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\ffxxlff.exec:\ffxxlff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
\??\c:\nnbbbn.exec:\nnbbbn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
\??\c:\9pppd.exec:\9pppd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\lllxxfx.exec:\lllxxfx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
\??\c:\tnthth.exec:\tnthth.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\ppdvp.exec:\ppdvp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
\??\c:\rfllfrr.exec:\rfllfrr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
\??\c:\btbtnn.exec:\btbtnn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
\??\c:\jdjdd.exec:\jdjdd.exe23⤵
- Executes dropped EXE
PID:3496 -
\??\c:\xfxllrl.exec:\xfxllrl.exe24⤵
- Executes dropped EXE
PID:1920 -
\??\c:\nbnbbb.exec:\nbnbbb.exe25⤵
- Executes dropped EXE
PID:4528 -
\??\c:\vjdjd.exec:\vjdjd.exe26⤵
- Executes dropped EXE
PID:216 -
\??\c:\lrxxfrx.exec:\lrxxfrx.exe27⤵
- Executes dropped EXE
PID:664 -
\??\c:\bhnnth.exec:\bhnnth.exe28⤵
- Executes dropped EXE
PID:1856 -
\??\c:\jppvj.exec:\jppvj.exe29⤵
- Executes dropped EXE
PID:928 -
\??\c:\tbbttb.exec:\tbbttb.exe30⤵
- Executes dropped EXE
PID:2960 -
\??\c:\jvvjj.exec:\jvvjj.exe31⤵
- Executes dropped EXE
PID:4388 -
\??\c:\rxfxrrl.exec:\rxfxrrl.exe32⤵
- Executes dropped EXE
PID:3948 -
\??\c:\tbttnn.exec:\tbttnn.exe33⤵
- Executes dropped EXE
PID:1432 -
\??\c:\jdjdp.exec:\jdjdp.exe34⤵
- Executes dropped EXE
PID:2044 -
\??\c:\rxllfrr.exec:\rxllfrr.exe35⤵
- Executes dropped EXE
PID:3476 -
\??\c:\bbbbnn.exec:\bbbbnn.exe36⤵
- Executes dropped EXE
PID:4244 -
\??\c:\dvpjj.exec:\dvpjj.exe37⤵
- Executes dropped EXE
PID:3256 -
\??\c:\9xrlfff.exec:\9xrlfff.exe38⤵
- Executes dropped EXE
PID:4608 -
\??\c:\5bbtbb.exec:\5bbtbb.exe39⤵
- Executes dropped EXE
PID:4548 -
\??\c:\bnbhnt.exec:\bnbhnt.exe40⤵
- Executes dropped EXE
PID:3572 -
\??\c:\vjjjv.exec:\vjjjv.exe41⤵
- Executes dropped EXE
PID:4672 -
\??\c:\3rffxff.exec:\3rffxff.exe42⤵
- Executes dropped EXE
PID:4900 -
\??\c:\rrffxxr.exec:\rrffxxr.exe43⤵
- Executes dropped EXE
PID:2968 -
\??\c:\tnnbth.exec:\tnnbth.exe44⤵
- Executes dropped EXE
PID:2564 -
\??\c:\jpddj.exec:\jpddj.exe45⤵
- Executes dropped EXE
PID:2092 -
\??\c:\jpppj.exec:\jpppj.exe46⤵
- Executes dropped EXE
PID:2912 -
\??\c:\ffllrrx.exec:\ffllrrx.exe47⤵
- Executes dropped EXE
PID:4316 -
\??\c:\nhbnhn.exec:\nhbnhn.exe48⤵
- Executes dropped EXE
PID:1876 -
\??\c:\jppvj.exec:\jppvj.exe49⤵
- Executes dropped EXE
PID:984 -
\??\c:\lfrrfff.exec:\lfrrfff.exe50⤵
- Executes dropped EXE
PID:916 -
\??\c:\bnnntt.exec:\bnnntt.exe51⤵
- Executes dropped EXE
PID:2052 -
\??\c:\tnttnb.exec:\tnttnb.exe52⤵
- Executes dropped EXE
PID:4336 -
\??\c:\dvvvj.exec:\dvvvj.exe53⤵
- Executes dropped EXE
PID:4712 -
\??\c:\ddddd.exec:\ddddd.exe54⤵
- Executes dropped EXE
PID:3516 -
\??\c:\rrfrrrr.exec:\rrfrrrr.exe55⤵
- Executes dropped EXE
PID:1236 -
\??\c:\bbbtth.exec:\bbbtth.exe56⤵
- Executes dropped EXE
PID:3520 -
\??\c:\9vvvj.exec:\9vvvj.exe57⤵
- Executes dropped EXE
PID:2940 -
\??\c:\xrxrrrl.exec:\xrxrrrl.exe58⤵
- Executes dropped EXE
PID:3960 -
\??\c:\xrlffff.exec:\xrlffff.exe59⤵
- Executes dropped EXE
PID:2000 -
\??\c:\bbtnhn.exec:\bbtnhn.exe60⤵
- Executes dropped EXE
PID:548 -
\??\c:\dvjvj.exec:\dvjvj.exe61⤵
- Executes dropped EXE
PID:2752 -
\??\c:\jpvjv.exec:\jpvjv.exe62⤵
- Executes dropped EXE
PID:2800 -
\??\c:\xlffrxr.exec:\xlffrxr.exe63⤵
- Executes dropped EXE
PID:4176 -
\??\c:\hnnnnt.exec:\hnnnnt.exe64⤵
- Executes dropped EXE
PID:432 -
\??\c:\1vvvv.exec:\1vvvv.exe65⤵
- Executes dropped EXE
PID:2364 -
\??\c:\lfrlflr.exec:\lfrlflr.exe66⤵PID:4920
-
\??\c:\5ffffff.exec:\5ffffff.exe67⤵PID:2684
-
\??\c:\nhhhbb.exec:\nhhhbb.exe68⤵PID:2560
-
\??\c:\fffxxxx.exec:\fffxxxx.exe69⤵PID:2016
-
\??\c:\hbbttt.exec:\hbbttt.exe70⤵PID:2528
-
\??\c:\ttttnn.exec:\ttttnn.exe71⤵PID:2980
-
\??\c:\3jvvv.exec:\3jvvv.exe72⤵PID:1128
-
\??\c:\dpjdp.exec:\dpjdp.exe73⤵PID:3620
-
\??\c:\3xxxlfr.exec:\3xxxlfr.exe74⤵PID:64
-
\??\c:\fffffff.exec:\fffffff.exe75⤵PID:1260
-
\??\c:\bhbtth.exec:\bhbtth.exe76⤵PID:3424
-
\??\c:\ppvvv.exec:\ppvvv.exe77⤵PID:2572
-
\??\c:\pvddv.exec:\pvddv.exe78⤵PID:3764
-
\??\c:\frfxffl.exec:\frfxffl.exe79⤵PID:32
-
\??\c:\thhhbb.exec:\thhhbb.exe80⤵PID:2984
-
\??\c:\hbbbbt.exec:\hbbbbt.exe81⤵PID:2124
-
\??\c:\fxfxrxr.exec:\fxfxrxr.exe82⤵PID:4156
-
\??\c:\1nnntt.exec:\1nnntt.exe83⤵PID:3648
-
\??\c:\ntbbbb.exec:\ntbbbb.exe84⤵PID:2864
-
\??\c:\dpjdv.exec:\dpjdv.exe85⤵PID:3224
-
\??\c:\htbbtt.exec:\htbbtt.exe86⤵PID:2960
-
\??\c:\jdvvv.exec:\jdvvv.exe87⤵PID:2844
-
\??\c:\lxxxrrr.exec:\lxxxrrr.exe88⤵PID:4388
-
\??\c:\5nttnn.exec:\5nttnn.exe89⤵PID:1452
-
\??\c:\jjpjd.exec:\jjpjd.exe90⤵PID:2892
-
\??\c:\fxrflfr.exec:\fxrflfr.exe91⤵PID:3600
-
\??\c:\btbbnt.exec:\btbbnt.exe92⤵PID:2096
-
\??\c:\9ppjd.exec:\9ppjd.exe93⤵PID:3872
-
\??\c:\xllfflx.exec:\xllfflx.exe94⤵PID:4744
-
\??\c:\nhthhb.exec:\nhthhb.exe95⤵PID:2952
-
\??\c:\xxfxrrr.exec:\xxfxrrr.exe96⤵PID:4040
-
\??\c:\xlxxrrr.exec:\xlxxrrr.exe97⤵PID:3488
-
\??\c:\9bnhbt.exec:\9bnhbt.exe98⤵PID:4968
-
\??\c:\tnnhtn.exec:\tnnhtn.exe99⤵PID:1916
-
\??\c:\7pjdp.exec:\7pjdp.exe100⤵PID:2740
-
\??\c:\frfxrrl.exec:\frfxrrl.exe101⤵PID:3664
-
\??\c:\7lfxxlf.exec:\7lfxxlf.exe102⤵PID:4308
-
\??\c:\btbtbb.exec:\btbtbb.exe103⤵PID:1564
-
\??\c:\btnhhh.exec:\btnhhh.exe104⤵PID:800
-
\??\c:\vvddv.exec:\vvddv.exe105⤵PID:2604
-
\??\c:\vjpjd.exec:\vjpjd.exe106⤵PID:3016
-
\??\c:\xxrlxxx.exec:\xxrlxxx.exe107⤵PID:1956
-
\??\c:\bhnnnn.exec:\bhnnnn.exe108⤵PID:1236
-
\??\c:\5ntnhh.exec:\5ntnhh.exe109⤵PID:1148
-
\??\c:\ddddd.exec:\ddddd.exe110⤵PID:3844
-
\??\c:\3xxlllx.exec:\3xxlllx.exe111⤵PID:2728
-
\??\c:\tbbbth.exec:\tbbbth.exe112⤵PID:2676
-
\??\c:\pjpvp.exec:\pjpvp.exe113⤵PID:4556
-
\??\c:\flrfxrl.exec:\flrfxrl.exe114⤵PID:4248
-
\??\c:\nhbthh.exec:\nhbthh.exe115⤵PID:1824
-
\??\c:\hntnhn.exec:\hntnhn.exe116⤵PID:3108
-
\??\c:\jvjjv.exec:\jvjjv.exe117⤵PID:2260
-
\??\c:\fxxrrxr.exec:\fxxrrxr.exe118⤵PID:5012
-
\??\c:\ttnnhn.exec:\ttnnhn.exe119⤵PID:3928
-
\??\c:\pdjdv.exec:\pdjdv.exe120⤵PID:3708
-
\??\c:\fxxxfff.exec:\fxxxfff.exe121⤵PID:3876
-
\??\c:\bnhnnh.exec:\bnhnnh.exe122⤵PID:5096
-
\??\c:\pjppj.exec:\pjppj.exe123⤵PID:1468
-
\??\c:\xfrxrlr.exec:\xfrxrlr.exe124⤵PID:2868
-
\??\c:\hnnhtn.exec:\hnnhtn.exe125⤵PID:208
-
\??\c:\5pdvp.exec:\5pdvp.exe126⤵PID:4568
-
\??\c:\frrrlrr.exec:\frrrlrr.exe127⤵PID:232
-
\??\c:\bhbbtt.exec:\bhbbtt.exe128⤵PID:1744
-
\??\c:\1xfxrrl.exec:\1xfxrrl.exe129⤵PID:3560
-
\??\c:\nnbnnh.exec:\nnbnnh.exe130⤵PID:224
-
\??\c:\hbtnbt.exec:\hbtnbt.exe131⤵PID:392
-
\??\c:\jdvvp.exec:\jdvvp.exe132⤵PID:4272
-
\??\c:\1lllfff.exec:\1lllfff.exe133⤵PID:4072
-
\??\c:\xfxxxfx.exec:\xfxxxfx.exe134⤵PID:1488
-
\??\c:\nbhhhh.exec:\nbhhhh.exe135⤵PID:1004
-
\??\c:\jpvvj.exec:\jpvvj.exe136⤵PID:1512
-
\??\c:\pjvpd.exec:\pjvpd.exe137⤵PID:3332
-
\??\c:\frrrlll.exec:\frrrlll.exe138⤵PID:2844
-
\??\c:\xlrrfff.exec:\xlrrfff.exe139⤵PID:4388
-
\??\c:\thhhhh.exec:\thhhhh.exe140⤵PID:1452
-
\??\c:\nttthh.exec:\nttthh.exe141⤵PID:5116
-
\??\c:\pjvpj.exec:\pjvpj.exe142⤵PID:1204
-
\??\c:\vvjjd.exec:\vvjjd.exe143⤵PID:4244
-
\??\c:\frfxrrl.exec:\frfxrrl.exe144⤵PID:3256
-
\??\c:\xrlrlll.exec:\xrlrlll.exe145⤵PID:1156
-
\??\c:\frlrxrf.exec:\frlrxrf.exe146⤵PID:3116
-
\??\c:\ntbbbt.exec:\ntbbbt.exe147⤵PID:972
-
\??\c:\5jdvp.exec:\5jdvp.exe148⤵PID:4024
-
\??\c:\jdjdj.exec:\jdjdj.exe149⤵PID:4968
-
\??\c:\5xrlllf.exec:\5xrlllf.exe150⤵PID:4136
-
\??\c:\lfrlffr.exec:\lfrlffr.exe151⤵PID:2396
-
\??\c:\nbbttt.exec:\nbbttt.exe152⤵PID:5052
-
\??\c:\btbthn.exec:\btbthn.exe153⤵PID:1564
-
\??\c:\vpvpj.exec:\vpvpj.exe154⤵PID:1332
-
\??\c:\3pvvp.exec:\3pvvp.exe155⤵PID:640
-
\??\c:\rxxlfxl.exec:\rxxlfxl.exe156⤵PID:512
-
\??\c:\bhbntb.exec:\bhbntb.exe157⤵PID:3520
-
\??\c:\djpvj.exec:\djpvj.exe158⤵PID:3076
-
\??\c:\vpjdp.exec:\vpjdp.exe159⤵PID:3960
-
\??\c:\xlrlllf.exec:\xlrlllf.exe160⤵PID:3776
-
\??\c:\llxxfrl.exec:\llxxfrl.exe161⤵PID:2752
-
\??\c:\bbhbbb.exec:\bbhbbb.exe162⤵PID:2948
-
\??\c:\nhnnnt.exec:\nhnnnt.exe163⤵PID:2800
-
\??\c:\jddvp.exec:\jddvp.exe164⤵PID:2692
-
\??\c:\3pdvp.exec:\3pdvp.exe165⤵PID:3056
-
\??\c:\ffffrxx.exec:\ffffrxx.exe166⤵PID:2036
-
\??\c:\rrrxxfl.exec:\rrrxxfl.exe167⤵PID:1504
-
\??\c:\tnbbtn.exec:\tnbbtn.exe168⤵PID:2684
-
\??\c:\9bnhbh.exec:\9bnhbh.exe169⤵PID:2560
-
\??\c:\djvvp.exec:\djvvp.exe170⤵PID:1904
-
\??\c:\flffxxx.exec:\flffxxx.exe171⤵PID:2528
-
\??\c:\hntnhb.exec:\hntnhb.exe172⤵PID:4788
-
\??\c:\ddppp.exec:\ddppp.exe173⤵PID:4652
-
\??\c:\7ffrfxl.exec:\7ffrfxl.exe174⤵PID:1784
-
\??\c:\lfxflrf.exec:\lfxflrf.exe175⤵PID:2300
-
\??\c:\bttttt.exec:\bttttt.exe176⤵PID:5024
-
\??\c:\pdjpd.exec:\pdjpd.exe177⤵PID:3424
-
\??\c:\dpddv.exec:\dpddv.exe178⤵PID:2572
-
\??\c:\1lfxrrr.exec:\1lfxrrr.exe179⤵PID:228
-
\??\c:\rlfffff.exec:\rlfffff.exe180⤵PID:32
-
\??\c:\bbbhbh.exec:\bbbhbh.exe181⤵PID:216
-
\??\c:\jvvvj.exec:\jvvvj.exe182⤵PID:4412
-
\??\c:\pjdvv.exec:\pjdvv.exe183⤵PID:1276
-
\??\c:\xxrffll.exec:\xxrffll.exe184⤵PID:3384
-
\??\c:\llfffff.exec:\llfffff.exe185⤵PID:5056
-
\??\c:\nnttnn.exec:\nnttnn.exe186⤵PID:3964
-
\??\c:\dpdvv.exec:\dpdvv.exe187⤵PID:912
-
\??\c:\jjjjd.exec:\jjjjd.exe188⤵PID:2844
-
\??\c:\5fffffl.exec:\5fffffl.exe189⤵PID:5112
-
\??\c:\xrflflf.exec:\xrflflf.exe190⤵PID:3328
-
\??\c:\nhhhbb.exec:\nhhhbb.exe191⤵PID:1020
-
\??\c:\hhtbbb.exec:\hhtbbb.exe192⤵PID:4744
-
\??\c:\ppvjj.exec:\ppvjj.exe193⤵PID:752
-
\??\c:\vpppp.exec:\vpppp.exe194⤵PID:2952
-
\??\c:\llfxrxx.exec:\llfxrxx.exe195⤵PID:1740
-
\??\c:\nnnnhn.exec:\nnnnhn.exe196⤵PID:1404
-
\??\c:\3ttnhb.exec:\3ttnhb.exe197⤵PID:3680
-
\??\c:\jjpjd.exec:\jjpjd.exe198⤵PID:3500
-
\??\c:\lfrlfll.exec:\lfrlfll.exe199⤵PID:4280
-
\??\c:\1frlllf.exec:\1frlllf.exe200⤵PID:4356
-
\??\c:\thhtnn.exec:\thhtnn.exe201⤵PID:1564
-
\??\c:\vdppv.exec:\vdppv.exe202⤵PID:3832
-
\??\c:\vdjdv.exec:\vdjdv.exe203⤵PID:4752
-
\??\c:\fxrrxxl.exec:\fxrrxxl.exe204⤵PID:1956
-
\??\c:\xlllfff.exec:\xlllfff.exe205⤵PID:4684
-
\??\c:\hhnnnn.exec:\hhnnnn.exe206⤵PID:1148
-
\??\c:\thbbnn.exec:\thbbnn.exe207⤵PID:2784
-
\??\c:\pdvvp.exec:\pdvvp.exe208⤵PID:1964
-
\??\c:\rllfrrr.exec:\rllfrrr.exe209⤵PID:3968
-
\??\c:\xffxrrr.exec:\xffxrrr.exe210⤵PID:2908
-
\??\c:\hbtthh.exec:\hbtthh.exe211⤵PID:4176
-
\??\c:\htbhtt.exec:\htbhtt.exe212⤵PID:3288
-
\??\c:\7vvpj.exec:\7vvpj.exe213⤵PID:1484
-
\??\c:\djvpj.exec:\djvpj.exe214⤵PID:1228
-
\??\c:\9xxrrll.exec:\9xxrrll.exe215⤵PID:2812
-
\??\c:\lxrxrxf.exec:\lxrxrxf.exe216⤵PID:2012
-
\??\c:\htbtnn.exec:\htbtnn.exe217⤵PID:2016
-
\??\c:\bntnhh.exec:\bntnhh.exe218⤵PID:1996
-
\??\c:\vvpvj.exec:\vvpvj.exe219⤵PID:3464
-
\??\c:\9dpdd.exec:\9dpdd.exe220⤵PID:2280
-
\??\c:\xxffffl.exec:\xxffffl.exe221⤵PID:4232
-
\??\c:\bnbbtt.exec:\bnbbtt.exe222⤵PID:64
-
\??\c:\1nnbtt.exec:\1nnbtt.exe223⤵PID:1260
-
\??\c:\vpvdv.exec:\vpvdv.exe224⤵PID:3036
-
\??\c:\9rfxxff.exec:\9rfxxff.exe225⤵PID:3496
-
\??\c:\rxxxrxx.exec:\rxxxrxx.exe226⤵PID:3764
-
\??\c:\ntnbnb.exec:\ntnbnb.exe227⤵PID:392
-
\??\c:\nbbttt.exec:\nbbttt.exe228⤵PID:2500
-
\??\c:\5pdvj.exec:\5pdvj.exe229⤵PID:2988
-
\??\c:\vpvpj.exec:\vpvpj.exe230⤵PID:4352
-
\??\c:\rrxrxxl.exec:\rrxrxxl.exe231⤵PID:4668
-
\??\c:\xrlxxxx.exec:\xrlxxxx.exe232⤵PID:2828
-
\??\c:\tnnnnn.exec:\tnnnnn.exe233⤵PID:2092
-
\??\c:\hbbbnt.exec:\hbbbnt.exe234⤵PID:1512
-
\??\c:\pvpjj.exec:\pvpjj.exe235⤵PID:3384
-
\??\c:\pddjd.exec:\pddjd.exe236⤵PID:3332
-
\??\c:\lfrffxx.exec:\lfrffxx.exe237⤵PID:1508
-
\??\c:\tbhhbb.exec:\tbhhbb.exe238⤵PID:1460
-
\??\c:\5vpvd.exec:\5vpvd.exe239⤵PID:536
-
\??\c:\1jvjj.exec:\1jvjj.exe240⤵PID:3936
-
\??\c:\7bbtbb.exec:\7bbtbb.exe241⤵PID:3872
-
\??\c:\jdppj.exec:\jdppj.exe242⤵PID:2296